University of Texas at El Paso

Displaying 1-15 of 15 results

  • White Papers // Oct 2013

    Distributed Loop Scheduling Schemes for Cloud Systems

    Cloud computing infrastructure offers the computing resources as a homogeneous collection of virtual machine instances by different hardware configurations, which is transparent to end users. In fact, the computational powers of these virtual machine instances are different and behaves as a heterogeneous environment. Thus, scheduling and load balancing for high...

    Provided By University of Texas at El Paso

  • White Papers // Jun 2013

    Scheduling Algorithms for Elastic Mixed-Criticality Tasks in Multicore Systems

    The Elastic Mixed-Criticality (E-MC) task model and an Early-Release EDF (ER-EDF) scheduling algorithm have been studied to address the service interruption problem for low-criticality tasks in uni-processor systems, where the minimum service requirements of low-criticality tasks are guaranteed by their maximum periods. In this paper, focusing on multicore systems, the...

    Provided By University of Texas at El Paso

  • White Papers // May 2013

    Write Buffer Sharing Control in SMT Processors

    Simultaneous Multi-Threading (SMT) has been widely studied to lend modern-day CPUs a mechanism to improve resource utilization so as to lead to a higher instruction throughput by allowing concurrent execution of multiple independent threads with sharing of key datapath components. The key to a high-performance SMT is to optimize the...

    Provided By University of Texas at El Paso

  • White Papers // May 2013

    Preference-Oriented Scheduling Framework for Periodic Real-Time Tasks

    The authors consider a set of real-time periodic tasks where some tasks are preferably executed As Soon As Possible (ASAP) and others As Late As Possible (ALAP) while still meeting their deadlines. After introducing the idea of Preference-Oriented (PO) execution, they formally define the concept of PO-optimality. For fully-loaded systems...

    Provided By University of Texas at El Paso

  • White Papers // Dec 2012

    Uncover Hidden Personal Information: An Information Extraction Attack Against On-line Social Networks

    Millions of people use On-line Social Networks (OSNs) every day and privacy of sensitive personal information is a major concern. Although OSNs provide policies and mechanisms to allow users to control who can view their data, these efforts may not be sufficient under various privacy attacks. In this paper, the...

    Provided By University of Texas at El Paso

  • White Papers // Oct 2012

    Speculations on the Science of Web User Security

    There appears to be consensus among seasoned cyber security researchers that there is substantial disconnect between the research community's priorities and the real world - notwithstanding numerous intellectual advances in the theory and practice of cyber security over the past four decades. This is in part manifested by recent recurring...

    Provided By University of Texas at El Paso

  • White Papers // Oct 2012

    Preference-Oriented Scheduling Framework and its Application to Fault-Tolerant Real-Time Systems

    In fault-tolerant systems, the primary and backup copies of different tasks can be scheduled together on one processor, where primary tasks should be executed As Soon As Possible (ASAP) and backup tasks As Late As Possible (ALAP) for better performance. To address such mixed requirements, in this paper, the authors...

    Provided By University of Texas at El Paso

  • White Papers // Jun 2012

    Multiparty Cloud Computation

    With the increasing popularity of the cloud, clients outsource their data to clouds in order to take advantage of unlimited virtualized storage space and the low management cost. Such trend prompts the privately outsourcing computation, called Multiparty Cloud Computation (MCC): Given k clients storing their data in the cloud, how...

    Provided By University of Texas at El Paso

  • White Papers // May 2012

    A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques

    One of the key problems in Wireless Sensor Networks (WSNs) is how to identify the location of each node. The research community has done considerable work on this localization problem and developed various techniques ranging from hardware-based ones requiring extra units (e.g., GPS, directional antennas) to software-based ones requiring only...

    Provided By University of Texas at El Paso

  • White Papers // Dec 2011

    Effective Dispatching for Simultaneous Multi-Threading (SMT) Processors by Capping Per-Thread Resource Utilization

    Simultaneous Multi-Threading (SMT) provides a technique to improve resource utilization by sharing key data path components among multiple independent threads. When critical resources are shared by multiple threads, effective use of these resources proves to be the most important factor in fully exploiting the system potential. Allowing any of the...

    Provided By University of Texas at El Paso

  • White Papers // Sep 2010

    Development And Diffusion Of Customer Relationship Management Across Disciplines: Fad Or Fashion?

    The popularity of Customer Relationship Management has grown over the years and across disciplines, there is no clear consensus on how to define it. It also appears that different lifecycles exist of CRM depending on the discipline. This paper proposes a comprehensive definition of CRM that can be used across...

    Provided By University of Texas at El Paso

  • White Papers // Jan 2010

    Task Scheduling for Multiprocessor Systems with Autonomous Performance-Optimizing Control

    In all Non-Blocking Non-Preemptive (NBNP) scheduling techniques for a multicomputer system for processor allocation, Largest-Job-First (LJF) technique proves to possess a unique characteristic in utilizing as many processors as possible compared to others such as First-Come-First-Serve (FCFS) and Smallest-Job-First (SJF). However, a job-bypass limit that is preset to preclude the...

    Provided By University of Texas at El Paso

  • White Papers // Jan 2010

    Paradigm Depletion, Knowledge Production And Research Effort

    This paper deals with two elements of Thomas Kuhn (1962) ideas regarding paradigm: Depletion and resiliency. The possibility of paradigm depletion taking resilience into account, given the hierarchy among scientists, is modeled as a Stackelberg differential game between editors [leaders] and authors [followers]. A number of results emerge from the...

    Provided By University of Texas at El Paso

  • White Papers // Aug 2008

    Extracting Trust Network Information From Scientific Web Portals

    An increased exchange of (Scientific) information across organizations and disciplines is one of the long-term goals of the semantic web. In any such exchange of information, it is not difficult to identify one or more (Scientific) communities responsible for the measurement, gathering and processing of scientific information. More challenging, however,...

    Provided By University of Texas at El Paso

  • White Papers // Sep 2006

    Reliability Effects of Process and Thread Redundancy on Chip Multiprocessors

    The phenomenal performance gains in successive computer technologies have been obtained at the cost of drastic increases in power densities. This fact promoted energy to a first-class system resource, and energy-aware computing has recently become a major research area. At the same time, with the continued scaling of CMOS technologies...

    Provided By University of Texas at El Paso

  • White Papers // Dec 2012

    Uncover Hidden Personal Information: An Information Extraction Attack Against On-line Social Networks

    Millions of people use On-line Social Networks (OSNs) every day and privacy of sensitive personal information is a major concern. Although OSNs provide policies and mechanisms to allow users to control who can view their data, these efforts may not be sufficient under various privacy attacks. In this paper, the...

    Provided By University of Texas at El Paso

  • White Papers // May 2012

    A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques

    One of the key problems in Wireless Sensor Networks (WSNs) is how to identify the location of each node. The research community has done considerable work on this localization problem and developed various techniques ranging from hardware-based ones requiring extra units (e.g., GPS, directional antennas) to software-based ones requiring only...

    Provided By University of Texas at El Paso

  • White Papers // Oct 2012

    Speculations on the Science of Web User Security

    There appears to be consensus among seasoned cyber security researchers that there is substantial disconnect between the research community's priorities and the real world - notwithstanding numerous intellectual advances in the theory and practice of cyber security over the past four decades. This is in part manifested by recent recurring...

    Provided By University of Texas at El Paso

  • White Papers // Sep 2010

    Development And Diffusion Of Customer Relationship Management Across Disciplines: Fad Or Fashion?

    The popularity of Customer Relationship Management has grown over the years and across disciplines, there is no clear consensus on how to define it. It also appears that different lifecycles exist of CRM depending on the discipline. This paper proposes a comprehensive definition of CRM that can be used across...

    Provided By University of Texas at El Paso

  • White Papers // Aug 2008

    Extracting Trust Network Information From Scientific Web Portals

    An increased exchange of (Scientific) information across organizations and disciplines is one of the long-term goals of the semantic web. In any such exchange of information, it is not difficult to identify one or more (Scientific) communities responsible for the measurement, gathering and processing of scientific information. More challenging, however,...

    Provided By University of Texas at El Paso

  • White Papers // Jan 2010

    Paradigm Depletion, Knowledge Production And Research Effort

    This paper deals with two elements of Thomas Kuhn (1962) ideas regarding paradigm: Depletion and resiliency. The possibility of paradigm depletion taking resilience into account, given the hierarchy among scientists, is modeled as a Stackelberg differential game between editors [leaders] and authors [followers]. A number of results emerge from the...

    Provided By University of Texas at El Paso

  • White Papers // Jun 2012

    Multiparty Cloud Computation

    With the increasing popularity of the cloud, clients outsource their data to clouds in order to take advantage of unlimited virtualized storage space and the low management cost. Such trend prompts the privately outsourcing computation, called Multiparty Cloud Computation (MCC): Given k clients storing their data in the cloud, how...

    Provided By University of Texas at El Paso

  • White Papers // Jan 2010

    Task Scheduling for Multiprocessor Systems with Autonomous Performance-Optimizing Control

    In all Non-Blocking Non-Preemptive (NBNP) scheduling techniques for a multicomputer system for processor allocation, Largest-Job-First (LJF) technique proves to possess a unique characteristic in utilizing as many processors as possible compared to others such as First-Come-First-Serve (FCFS) and Smallest-Job-First (SJF). However, a job-bypass limit that is preset to preclude the...

    Provided By University of Texas at El Paso

  • White Papers // Sep 2006

    Reliability Effects of Process and Thread Redundancy on Chip Multiprocessors

    The phenomenal performance gains in successive computer technologies have been obtained at the cost of drastic increases in power densities. This fact promoted energy to a first-class system resource, and energy-aware computing has recently become a major research area. At the same time, with the continued scaling of CMOS technologies...

    Provided By University of Texas at El Paso

  • White Papers // Oct 2013

    Distributed Loop Scheduling Schemes for Cloud Systems

    Cloud computing infrastructure offers the computing resources as a homogeneous collection of virtual machine instances by different hardware configurations, which is transparent to end users. In fact, the computational powers of these virtual machine instances are different and behaves as a heterogeneous environment. Thus, scheduling and load balancing for high...

    Provided By University of Texas at El Paso

  • White Papers // Jun 2013

    Scheduling Algorithms for Elastic Mixed-Criticality Tasks in Multicore Systems

    The Elastic Mixed-Criticality (E-MC) task model and an Early-Release EDF (ER-EDF) scheduling algorithm have been studied to address the service interruption problem for low-criticality tasks in uni-processor systems, where the minimum service requirements of low-criticality tasks are guaranteed by their maximum periods. In this paper, focusing on multicore systems, the...

    Provided By University of Texas at El Paso

  • White Papers // May 2013

    Preference-Oriented Scheduling Framework for Periodic Real-Time Tasks

    The authors consider a set of real-time periodic tasks where some tasks are preferably executed As Soon As Possible (ASAP) and others As Late As Possible (ALAP) while still meeting their deadlines. After introducing the idea of Preference-Oriented (PO) execution, they formally define the concept of PO-optimality. For fully-loaded systems...

    Provided By University of Texas at El Paso

  • White Papers // Oct 2012

    Preference-Oriented Scheduling Framework and its Application to Fault-Tolerant Real-Time Systems

    In fault-tolerant systems, the primary and backup copies of different tasks can be scheduled together on one processor, where primary tasks should be executed As Soon As Possible (ASAP) and backup tasks As Late As Possible (ALAP) for better performance. To address such mixed requirements, in this paper, the authors...

    Provided By University of Texas at El Paso

  • White Papers // May 2013

    Write Buffer Sharing Control in SMT Processors

    Simultaneous Multi-Threading (SMT) has been widely studied to lend modern-day CPUs a mechanism to improve resource utilization so as to lead to a higher instruction throughput by allowing concurrent execution of multiple independent threads with sharing of key datapath components. The key to a high-performance SMT is to optimize the...

    Provided By University of Texas at El Paso

  • White Papers // Dec 2011

    Effective Dispatching for Simultaneous Multi-Threading (SMT) Processors by Capping Per-Thread Resource Utilization

    Simultaneous Multi-Threading (SMT) provides a technique to improve resource utilization by sharing key data path components among multiple independent threads. When critical resources are shared by multiple threads, effective use of these resources proves to be the most important factor in fully exploiting the system potential. Allowing any of the...

    Provided By University of Texas at El Paso